New & Notable

Get Started

How to create a third-party risk management policy

NIST's Cybersecurity Framework offers some helpful tips for organizations to fortify their third-party risk management strategies. Here's how to implement them.

Manage

How to build an effective purple team playbook

Enterprises across a wide variety of vertical industries can benefit from purple team exercises that harness red and blue teams toward a common goal: reducing vulnerabilities.

News

Chainalysis records 35% decrease in ransom payments in 2024

While the first half of 2024 was on pace to surpass 2023's record-setting numbers, Chainalysis found that the volume of ransom payments dropped in the second half of the year.

News

AMD, Google disclose Zen processor microcode vulnerability

AMD said CVE-2024-56161, which first leaked last month, requires an attacker to have local administrator privileges as well as developed and executed malicious microcode.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security